Legality Stable Analysis Pattern

M.E. Fayad*, Siddharth Jindal**
* Professor, Department of Computer Engineering, Charles W. Davidson College of Engineering, San Jose State University, San Jose, USA.
* *Student, Department of Computer Engineering, Charles W. Davidson College of Engineering, San Jose State University, San Jose, USA.
Periodicity:April - June'2015
DOI : https://doi.org/10.26634/jse.9.4.3526

Abstract

Legality is an umbrella term that encompasses every aspect of dealing and working with different entities in a lawful manner. Although, legality finds application across almost every existing system, an explicitly defined pattern do not exist for it even now. Hence, this paper will introduce the process of modeling different kinds of related applications without needing to re-think the problem every time and from scratch. The legality pattern represents the core knowledge of anything that complies with the regulations of its arbitration authority. In addition, this pattern can be reused as part of any new model which deals with legality in some way or the other. The pattern utilizes the concepts defined in the Software Stability Model (SSM) to develop a more stable and generic model. This will help in eliminating the need of repeating the process of separately modeling legality for each related domain.

Keywords

Legality, Software Patterns, Stable Analysis Pattern, Software Stability Model, Knowledge Map.

How to Cite this Article?

Fayad, M. E., and Jindal, S. J. (2015). Legality Stable Analysis Pattern. i-manager’s Journal on Software Engineering, 9(4), 1-6. https://doi.org/10.26634/jse.9.4.3526

References

[1]. Fayad, M. E. (2002). Accomplishing software stability. Communications of the ACM, Vol.45, No.4.
[2]. Fayad, M. E. (2002). How to deal with software stability. Communications of the ACM, Vol.45, No.4.
[3]. Fayad, M. E. (2015). Stable Analysis Patterns for Software and Systems. Boca Raton: CRC Press.
[4]. Fayad, M. E., & Altman, A. (2001). An introduction to software stability. Communications of the ACM, Vol.44.
[5]. Fayad, M. E., & Jindal, S. (2015). A self- adaptive Legality Pattern for reuse driven software processes. Software: Practice and Experience, Vol.44, No.9.
[6]. Fayad, M. E., & Jindal, S. (2015). Accessibility Stable Analysis Pattern. Information Reuse and Integration (IRI 2015). San Francisco.
[7]. Fayad, M. E., & Jindal, S. (2015). Stable Business Rule Standard. Boca Raton, FL: CRC Press.
[8]. Fayad, M. E., & Wu, S. (2002). Merging multiple conventional models in one table model. Communications of the ACM, Vol.45, No.4.
[9]. Fayad, M. E., Sanchez, H. A., Hegde, S. G., Basia, A., & Vakil, A. (2014). Software Patterns, Knowledge Maps, and Domain Analysis. Boca Raton: CRC Press.
[10]. Froehlich, G., Hoover, H., Liu, L., & Sorenson, P. (1998). Reusing application frameworks through hooks. Object-Oriented Application Frameworks. John Wiley.
[11]. Halstead, M. H. (1977). In Elements of Software Science. North Holland: Elsevier Computer Science Library, pp.1-60.
[12]. Hamza, H., & Fayad, M. E. (2002, June). Modelbased software reuse using stable analysis patterns. ECOOP.
[13]. Hamza., H. (2002). Building Stable Analysis Patterns Using Software Stability. GCSE/NoDE YRW 2002. Erfurt, Germany: 4th European GCSE Young Researchers Workshop.
[14]. Jeffries, J. C. (1985). Legality, Vagueness, and the Construction of Penal Statutes. Virginia Law Review, pp.189-245.
[15]. Jindal, S. (2015). Stable Business Rule Standard. San Jose: San Jose State University.
[16]. Kelsen, H. (1945). General theory of law and state (Vol. 1). The Lawbook Exchange, Ltd.
[17]. Mahdy, A., & Fayad, M. E. (2002). A Software Stability Model Pattern. Proc. of the 9 th Conference on Pattern Language of Programs. Illinois, USA: Pattern Language of Programs.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.